Craft Attacks from Geographic Location Data on Social Media Using Creepy Cree.py is an open source intelligence tool dedicated to determining victim geographic location (exact longitude and latitude) based on their social media posts. This article will provide a tutorial on what you can do with creepy

Did someone share a Google Doc with you? If yes, you might be one of the millions of internet users who fell victim to this scam campaign. In the last few days, a lot of people received emails from their contacts with a seemingly normal and legitimate invitation

Http proxy protection is a commonly used protection method that will mask a hosts location through the use of intermediary servers. The application Websploit has a very powerful tool that will help a penetration tester resolve an Http proxy protected website into host locations. This is the

Ping and Traceroute form a simple pair of tools for operating system recognition. The technique consists of the sum of the jumps and TTL. Firstly, we must be aware of the TTL return value of the various Operating Systems. – Cyclades = Usually 30 – Linux =

I am sure many people that use OSINT are aware of these tools and links; however, information, and acquiring that information from all sources, is relevant and should never be overlooked. Hopefully, this will come in handy for OSINT investigations. I have listed some resources that are

Question: Who is the most important person in an organization? Is it the CEO? Is it the Finance director? Is it Bob in Sales? Is it you? We are all cogs in the machine, but sometimes there are some key components a company can not do without.

Fingerprinting assaults are methods for recognizing people by some sort of characteristic of their online movement. In a few ways, fingerprinting assaults are the most hazardous and troublesome sort of de-anonymizing dangers to safeguard against. I need to highlight one feature of fingerprinting that is utilized by

Introduction to MTR My Traceroute (mtr) merges the services and performance of the ping and traceroute programs into one networking tool. Upon starting this diagnostic tool, mtr investigates the network connection. This typically happens between the host that the mtr runs on, and the (user-specified) destination host. After determining the address of

Hello Cybrary.it! This is my first time writing here, so if I make any mistakes, correct me in the comments. Some of these acronyms aren’t used daily, but they’re still good to know. CCTV / CLOSED CIRCUIT TELEVISION CPU / CENTRAL PROCESSING UNIT DDoS / DISTRIBUTED DENIAL OF

Linux is fun! Huhhh? OK, so you don’t believe me. Meet me at the end of this article and you’ll believe that Linux is actually a fun box. 1. Command: sl (Steam Locomotive) You might be aware of command ‘ls‘ – the list command – and use it frequently to

Begin Learning Cyber Security for FREE Now!

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.